Items Tagged with "Infosec"

Now that I've had a chance to decompress from and reflect upon the terrific Suits and Spooks DC conference last weekend, I want to share some surprising shifts in thinking that occurred for me during those two days.

With all this invaluable data and information, and the growth in smartphones and tablets, it’s natural for criminal hackers to see these new devices as a huge opportunity, much like they did with the PC. So if you have a smartphone or tablet, make sure you take steps to protect yourself...

The goal of Security BSides is to expand the spectrum of conversation beyond the traditional confines of space and time. The conferences create opportunities for individuals to both present and participate in an intimate atmosphere that encourages collaboration...

Last year, I put out a call to the infosec community on Twitter for some new ideas on electronic music and Sci Fi books in the “cyberpunk” genre. Tons of you responded, and I wanted to capture this in a blog post to share the feedback...

I was fascinated to read about the last year cancellation of the British Ruby conference due to the arguments that the speaker lineup lacked diversity. Other people have their own opinions on why we have this problem and what we should do about it...

Listening to bad brand statements is like sitting through a bad movie or comedy skit. Yes, I am among those who stand politely as a vendor tries to sell me something without bothering to determine what I actually care about. At least I get to learn about bad brand stories...

As the New Year approaches, have you thought about your New Year’s resolutions? As a member of the information security industry, I would like to share five resolutions that you should definitely add to your list...

Technology evolves so quickly that 12 weeks is an age when it comes to new ideas and market changes - and security is no different. However, the main areas I will personally be following with interest though, will be the BYOD/BYOA, personnel, preemptive security and social intelligence...

But seriously folks, this post may be cathartic for me and a chuckle for you, but in reality it will change nothing. The douches will be douchey and the charlatans will sell their cyber snake oils. Enjoy the charlatanism and douchery...

Hacker Halted 2012 was full of personalities; executives, technologists, students and security enthusiasts – each one with stories that fueled conversations and debate. Technical and business erudition dominated the speaker sessions and the hacking competitions...

In the broad spectrum of activities which might be called Information Security, we must always first and foremost implement, execute and follow through with risk management. Risk management is the backbone or foundation of any good information security program...

When I was asked to come out to Quebec for a conference called Hackfest.CA, I was interested because this isn't a conference I had heard of, and it wasn't on my radar. Additionally, the name suggests it's geared towards the 'hackers' and quite frankly, I'm fairly out of practice...

For years security vendors have been able to play off the general fears of malware and cyber attacks. As the scope of protecting data has become more complex, we’ve slowly learned that deploying more security controls alone is not a risk management solution...

BSidesJackson was the 1st infosec conference to be held in Mississippi. I organized BSidesJackson because I believe in infosec, and I also believe that having a local infosec community is essential...no matter where you work or what type of information/networks you must protect...